Responsibility and reporting lines cannot always be established when auditing automated systems since:
Responsibility and reporting lines cannot always be established when auditing automated systems
since:
The root cause of a successful cross site request forgery (XSRF) attack against an application is that the vul
The root cause of a successful cross site request forgery (XSRF) attack against an application is
that the vulnerable application:
This principle of data integrity is known as:
In an online transaction processing system, data integrity is maintained by ensuring that a
transaction is either completed in its entirety or not at all. This principle of data integrity is known
as:
Of the following, retention of business records should be PRIMARILY based on:
Of the following, retention of business records should be PRIMARILY based on:
Which of the following would help to ensure the portability of an application connected to a database?
Which of the following would help to ensure the portability of an application connected to a
database?
What is the MOST important action that the information security manager needs to perform?
An organization is entering into an agreement with a new business partner to conduct customer
mailings. What is the MOST important action that the information security manager needs to
perform?
Which of the following should an IS auditor recommend?
Business units are concerned about the performance of a newly implemented system. Which of
the following should an IS auditor recommend?
Which of the following is the MOST useful requirement to include in the contract?
An organization that outsourced its payroll processing performed an independent assessment of
the security controls of the third party, per policy requirements. Which of the following is the MOST
useful requirement to include in the contract?
Which of the following would be an IS auditor’s main concern about the new process?
A company undertakes a business process reengineering (BPR) project in support of a new and
direct marketing approach to its customers. Which of the following would be an IS auditor’s main
concern about the new process?
Which of the following is the MOST critical activity to ensure the ongoing security of outsourced IT services?
Which of the following is the MOST critical activity to ensure the ongoing security of outsourced IT
services?